HTTP/2 and SPDY Request Vulnerability in F5 BIG-IP Systems
CVE-2017-6155

7.5HIGH

Summary

A vulnerability in F5 BIG-IP systems arises from the processing of malformed SPDY or HTTP/2 requests, potentially leading to service disruption for traffic managed by the Traffic Management Microkernel (TMM). It occurs when these profiles are assigned to a virtual server, exposing the data plane to risks when handling non-compliant requests. This vulnerability does not affect the control plane, ensuring limited exposure. For detailed information, refer to the supporting documentation.

Affected Version(s)

BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 13.0.0

BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 12.0.0-12.1.3.1

BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 11.6.0-11.6.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.